摘要: n this example, we'll be setting up a custom authorization scheme based on a key which will be validated using a very simple algorithm. This isn't secure for any number of reasons, but with some minor modifications (e.g. expiring a key once it is used) it would be sufficient for things like 阅读全文
posted @ 2013-02-07 16:28 chunchill 阅读(240) 评论(0) 推荐(0) 编辑